FME 2002:Formal Methods—Getting IT Right

International Symposium of Formal Methods Europe Copenhagen, Denmark, July 22–24, 2002 Proceedings

Editors:

ISBN: 978-3-540-43928-8 (Print) 978-3-540-45614-8 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. No Access

    Book Chapter

    Pages 1-20

    Little Engines of Proof

  2. No Access

    Book Chapter

    Pages 21-40

    Automated Boundary Testing from Z and B

  3. No Access

    Book Chapter

    Pages 41-56

    Improvements in Coverability Analysis

  4. No Access

    Book Chapter

    Pages 57-76

    Heuristic-Driven Test Case Selection from Formal Specifications. A Case Study

  5. No Access

    Book Chapter

    Pages 77-88

    UniTesK Test Suite Architecture

  6. No Access

    Book Chapter

    Pages 89-105

    Hoare Logic for NanoJava: Auxiliary Variables, Side Effects, and Virtual Methods Revisited

  7. No Access

    Book Chapter

    Pages 106-125

    Do Not Read This

  8. No Access

    Book Chapter

    Pages 126-145

    Safeness of Make-Based Incremental Recompilation

  9. No Access

    Book Chapter

    Pages 146-162

    An Algorithmic Approach to Design Exploration

  10. No Access

    Book Chapter

    Pages 163-183

    Mechanical Abstraction of CSP Z Processes

  11. No Access

    Book Chapter

    Pages 184-203

    Verifying Erlang Code: A Resource Locker Case-Study

  12. No Access

    Book Chapter

    Pages 204-223

    Towards an Integrated Model Checker for Railway Signalling Data

  13. No Access

    Book Chapter

    Pages 224-233

    Correctness by Construction: Integrating Formality into a Commercial Development Process

  14. No Access

    Book Chapter

    Pages 234-251

    VAlloy — Virtual Functions Meet a Relational Language

  15. No Access

    Book Chapter

    Pages 252-271

    Verification Using Test Generation Techniques

  16. No Access

    Book Chapter

    Pages 272-289

    Formal Specification and Static Checking of Gemplus’ Electronic Purse Using ESC/Java

  17. No Access

    Book Chapter

    Pages 290-309

    Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods

  18. No Access

    Book Chapter

    Pages 310-329

    Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation

  19. No Access

    Book Chapter

    Pages 330-349

    Interference Analysis for Dependable Systems Using Refinement and Abstraction

  20. No Access

    Book Chapter

    Pages 350-369

    The Formal Classification and Verification of Simpson’s 4-Slot Asynchronous Communication Mechanism

previous Page of 2